查看: 9770|回复: 87
收起左侧

[新手上路] 微软“云端七大引擎+客户端七大引擎”同步运转。

  [复制链接]
ELOHIM
发表于 2019-7-28 16:41:00 | 显示全部楼层 |阅读模式
本帖最后由 ELOHIM 于 2019-7-28 20:24 编辑

https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10

https://www.microsoft.com/securi ... neration-protection



Inside out: Get to know the advanced technologies at the core of Microsoft Defender ATP next generation protection                                                                                                                      
While Windows Defender Antivirus makes catching 5 billion threats on devices every month look easy, multiple advanced detection and prevention technologies work under the hood to make this happen.
Windows Defender Antivirus is the next-generation protection component of Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP), Microsoft’s unified endpoint security platform. Much like how Microsoft Defender ATP integrates multiple capabilities to address the complex security challenges in modern enterprises, Windows Defender Antivirus uses multiple engines to detect and stop a wide range of threats and attacker techniques at multiple points.
These next-generation protection engines provide industry-best detection and blocking capabilities. Many of these engines are built into the client and provide advanced protection against majority of threats in real-time. When the client encounters unknown threats, it sends metadata or the file itself to the cloud protection service, where more advanced protections examine new threats on the fly and integrate signals from multiple sources.
These next-generation protection engines ensure that protection is:
  • Accurate: Threats both common and sophisticated, a lot of which are designed to try and slip through protections, are detected and blocked
  • Real-time: Threats are prevented from getting on to devices, stopped in real-time at first sight, or detected and remediated in the least possible time (typically within a few milliseconds)
  • Intelligent: Through the power of the cloud, machine learning (ML), and Microsoft’s industry-leading optics, protection is enriched and made even more effective against new and unknown threats
My team continuously enhances each of these engines to be increasingly effective at catching the latest strains of malware and attack methods. These enhancements show up in consistent top scores in industry tests, but more importantly, translate to threats and malware outbreaks stopped and more customers protected.
Here’s a rundown of the many components of the next generation protection capabilities in Microsoft Defender ATP:
In the cloud:
  • Metadata-based ML engine – Specialized ML models, which include file type-specific models, feature-specific models, and adversary-hardened monotonic models, analyze a featurized description of suspicious files sent by the client. Stacked ensemble classifiers combine results from these models to make a real-time verdict to allow or block files pre-execution.
  • Behavior-based ML engine – Suspicious behavior sequences and advanced attack techniques are monitored on the client as triggers to analyze the process tree behavior using real-time cloud ML models. Monitored attack techniques span the attack chain, from exploits, elevation, and persistence all the way through to lateral movement and exfiltration.
  • AMSI-paired ML engine – Pairs of client-side and cloud-side models perform advanced analysis of scripting behavior pre- and post-execution to catch advanced threats like fileless and in-memory attacks. These models include a pair of models for each of the scripting engines covered, including PowerShell, JavaScript, VBScript, and Office VBA macros. Integrations include both dynamic content calls and/or behavior instrumentation on the scripting engines.
  • File classification ML engine – Multi-class, deep neural network classifiers examine full file contents, provides an additional layer of defense against attacks that require additional analysis. Suspicious files are held from running and submitted to the cloud protection service for classification. Within seconds, full-content deep learning models produce a classification and reply to the client to allow or block the file.
  • Detonation-based ML engine – Suspicious files are detonated in a sandbox. Deep learning classifiers analyze the observed behaviors to block attacks.
  • Reputation ML engine – Domain-expert reputation sources and models from across Microsoft are queried to block threats that are linked to malicious or suspicious URLs, domains, emails, and files. Sources include Windows Defender SmartScreen for URL reputation models and Office 365 ATP for email attachment expert knowledge, among other Microsoft services through the Microsoft Intelligent Security Graph.
  • Smart rules engine – Expert-written smart rules identify threats based on researcher expertise and collective knowledge of threats.
On the client:
  • ML engine – A set of light-weight machine learning models make a verdict within milliseconds. These include specialized models and features that are built for specific file types commonly abused by attackers. Examples include models built for portable executable (PE) files, PowerShell, Office macros, JavaScript, PDF files, and more.
  • Behavior monitoring engine – The behavior monitoring engine monitors for potential attacks post-execution. It observes process behaviors, including behavior sequence at runtime, to identify and block certain types of activities based on predetermined rules.
  • Memory scanning engine – This engine scans the memory space used by a running process to expose malicious behavior that may be hiding through code obfuscation.
  • AMSI integration engine – Deep in-app integration engine enables detection of fileless and in-memory attacks through Antimalware Scan Interface (AMSI), defeating code obfuscation. This integration blocks malicious behavior of scripts client-side.
  • Heuristics engine – Heuristic rules identify file characteristics that have similarities with known malicious characteristics to catch new threats or modified versions of known threats.
  • Emulation engine – The emulation engine dynamically unpacks malware and examines how they would behave at runtime. The dynamic emulation of the content and scanning both the behavior during emulation and the memory content at the end of emulation defeat malware packers and expose the behavior of polymorphic malware.
  • Network engine – Network activities are inspected to identify and stop malicious activities from threats.
Together with attack surface reduction—composed of advanced capabilities like hardware-based isolation, application control, exploit protection, network protection, controlled folder access, attack surface reduction rules, and network firewall—these next-generation protection engines deliver Microsoft Defender ATP’s pre-breach capabilities, stopping attacks before they can infiltrate devices and compromise networks.
As part of Microsoft’s defense-in-depth solution, the superior performance of these engines accrues to the Microsoft Defender ATP unified endpoint protection, where antivirus detections and other next-generation protection capabilities enrich endpoint detection and response, automated investigation and remediation, advanced hunting, threat and vulnerability management, managed threat hunting service, and other capabilities.
These protections are further amplified through Microsoft Threat Protection, Microsoft’s comprehensive, end-to-end security solution for the modern workplace. Through signal-sharing and orchestration of remediation across Microsoft’s security technologies, Microsoft Threat Protection secures identities, endpoints, email and data, apps, and infrastructure.
The enormous evolution of Microsoft Defender ATP’s next generation protection follows the same upward trajectory of innovation across Microsoft’s security technologies, which the industry recognizes, and customers benefit from. We will continue to improve and lead the industry in evolving security.

Tanmay Ganacharya (@tanmayg)
Principal Director, Microsoft Defender ATP Research



@WindowsDefender Fans

评分

参与人数 2人气 +4 收起 理由
Jirehlov1234 + 1
为你心碎 + 3 感谢提供分享

查看全部评分

静影沉璧
发表于 2019-7-28 16:55:11 | 显示全部楼层
说实话我对这个Microsoft Defender ATP挺感兴趣。。只是这个羊毛似乎不好薅

评分

参与人数 1人气 +1 收起 理由
ELOHIM + 1 感谢解答: )

查看全部评分

驭龙
发表于 2019-7-28 17:01:21 | 显示全部楼层
这文章发布的时候我就看了,本想全文人工翻译以后+测试分析再发,不过太懒,最终没有发相关帖子
我只说一下重点,这里说的WDATP是NGP部分,所以云端7引擎与本地7引擎都是WDAV可以使用的,并不是说只有WDATP才能使用全部功能,WDATP的高级功能在其它功能中,现在WDATP中的NGP指的就是WDAV

评分

参与人数 1人气 +1 收起 理由
ELOHIM + 1 感谢解答: )

查看全部评分

ELOHIM
 楼主| 发表于 2019-7-28 17:03:53 | 显示全部楼层
静影沉璧 发表于 2019-7-28 16:55
说实话我对这个Microsoft Defender ATP挺感兴趣。。只是这个羊毛似乎不好薅

集中精力认真薅一下吧。。
嘿嘿
ELOHIM
 楼主| 发表于 2019-7-28 17:07:31 | 显示全部楼层
驭龙 发表于 2019-7-28 17:01
这文章发布的时候我就看了,本想全文人工翻译以后+测试分析再发,不过太懒,最终没有发相关帖子
我只说一 ...

这个文章我以前收藏在微信里,早就忘了。。
上山下乡,一出门就是水老鼠。。

不过肯定没有你看到的时候早。。

如果以安全的名义,微软没必要向普通人员要安全培训费和功能使用费吧。。

只是,我担心的问题是,功能增加了以后,漏洞势必也会增加。
希望开发人员多做性能测试和安全审计,将不必要的风险消灭在预览版里面。
驭龙
发表于 2019-7-28 17:10:28 | 显示全部楼层
ELOHIM 发表于 2019-7-28 17:07
这个文章我以前收藏在微信里,早就忘了。。
上山下乡,一出门就是水老鼠。。
WD漏洞不存在风险的,开启WDABS以后,几乎没有威胁能利用WDAV漏洞攻击系统,因为WDAV把自己入沙,与系统完全隔离
ELOHIM
 楼主| 发表于 2019-7-28 17:20:56 | 显示全部楼层
驭龙 发表于 2019-7-28 17:10
WD漏洞不存在风险的,开启WDABS以后,几乎没有威胁能利用WDAV漏洞攻击系统,因为WDAV把自己入沙,与系统完 ...

这又是一个好消息。哈哈
驭龙
发表于 2019-7-28 17:23:07 | 显示全部楼层
ELOHIM 发表于 2019-7-28 17:20
这又是一个好消息。哈哈

这个去年不是已经发了吗?翻译成中文就是自动化沙箱服务,也就是之前的WD沙箱CP进程那种技术,而我现在期待的是WD改成MD的时候,能不能大版本更新
ELOHIM
 楼主| 发表于 2019-7-28 17:26:05 | 显示全部楼层
驭龙 发表于 2019-7-28 17:23
这个去年不是已经发了吗?翻译成中文就是自动化沙箱服务,也就是之前的WD沙箱CP进程那种技术,而我现在期 ...

微软更名部。。
无论是否入沙,有漏洞我就感觉怕。
不是简单的耍流氓。。

何况系统漏洞也挺多的。
驭龙
发表于 2019-7-28 17:29:57 | 显示全部楼层
ELOHIM 发表于 2019-7-28 17:26
微软更名部。。
无论是否入沙,有漏洞我就感觉怕。
不是简单的耍流氓。。

理论上如果WDAV入沙,基本上不容易漏,起码比其它不入沙的安软安全多了,其它安软的沙箱只不过是把运行程序入沙,并非把自我入沙
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2024-4-23 19:44 , Processed in 0.144943 second(s), 18 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表